access security

November 5, 2020

DEVELOPER

Learn How to Secure Your Cloud-native Applications and Infrastructure – Part 2, Cisco Duo

3 min read

See how adding Duo MFA to the login process reduces the risk of a data breach and ensures trusted access to sensitive data in your applications.

August 25, 2020

NETWORKING

Identify Endpoints, Enforce Policies, and Stop Threats with Network Segmentation

6 min read

Granular network segmentation is the preferred defensive method to prevent the lateral spread of threats through networks. It is also ideal to enforce policies that restrict access to applications by trusted devices and individuals. Automation for identifying, grouping, and enforcing segmentation policies is key to securing networks of all sizes.

November 27, 2018

SECURITY

Securing Access to Our Nation’s Critical Infrastructure

3 min read

Threats to energy and utilities firms target enterprise IT networks - here is a breakdown of the most common attack scenarios and how to effectively mitigate against remote access risks.